Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe
-
Size
1.5MB
-
MD5
c805f28a5a0e034e3d1cce1e6c827863
-
SHA1
80c43683be6b1b90474ff70c74d013ccec335723
-
SHA256
7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f
-
SHA512
0357c8fff1bafbcc113d46ece91464e28ddb531324a06edf07a4864ef334d2e6fd6149a4a4e487014a2e654531779ef561ba848a0424e81a273cfd6e976130fc
-
SSDEEP
24576:jyO9vxd/fJr2POpV7OoxiA5Lyqx2rRfjKsOVDCqBuLsLgzxJUH0bTkH8DIv1pQne:2SJrOoOAZLya2dfjL+1gL8g0H0HSTHUz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 3048 tk0zI13.exe 2640 pJ5xH79.exe 2900 Em4nO54.exe 2504 1Uk85rQ1.exe -
Loads dropped DLL 12 IoCs
pid Process 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 3048 tk0zI13.exe 3048 tk0zI13.exe 2640 pJ5xH79.exe 2640 pJ5xH79.exe 2900 Em4nO54.exe 2900 Em4nO54.exe 2504 1Uk85rQ1.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe 2428 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tk0zI13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pJ5xH79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Em4nO54.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 2888 2504 1Uk85rQ1.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2428 2504 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 AppLaunch.exe 2888 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 1680 wrote to memory of 3048 1680 7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe 28 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 3048 wrote to memory of 2640 3048 tk0zI13.exe 29 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2640 wrote to memory of 2900 2640 pJ5xH79.exe 30 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2900 wrote to memory of 2504 2900 Em4nO54.exe 31 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2888 2504 1Uk85rQ1.exe 32 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33 PID 2504 wrote to memory of 2428 2504 1Uk85rQ1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe"C:\Users\Admin\AppData\Local\Temp\7a189e512b93a6092b4f577f7cfdd8a3acc207cd391b77ced502d482b1ce391f_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tk0zI13.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tk0zI13.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pJ5xH79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pJ5xH79.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Em4nO54.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Em4nO54.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uk85rQ1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uk85rQ1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2428
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53f99439581b3499defd4a58c6f1cc2eb
SHA1236a6539ddddfe2ebfc79bfe9e4a71cafb04293f
SHA25651a0e3dff0e0eac66c47a02afab27de7e20b89e5d750843bb5739b9fe766c463
SHA512736482e9845db40f473b02d2c4a5246a80d78f7295ce11a65db2494b9450332ded22e728a7944ab259907509fbf76628a933d0251b7b5fad09fcd1f8e5d98d9f
-
Filesize
1.3MB
MD53f99439581b3499defd4a58c6f1cc2eb
SHA1236a6539ddddfe2ebfc79bfe9e4a71cafb04293f
SHA25651a0e3dff0e0eac66c47a02afab27de7e20b89e5d750843bb5739b9fe766c463
SHA512736482e9845db40f473b02d2c4a5246a80d78f7295ce11a65db2494b9450332ded22e728a7944ab259907509fbf76628a933d0251b7b5fad09fcd1f8e5d98d9f
-
Filesize
930KB
MD5d66dd11b05c5b7841081e76e5ce5f740
SHA14b7a29381d069145ae110cb44f30fff64c93ea35
SHA256bd2ba0d8232eb823ee3c6fe6f4d6b82ca36d2c9b80e393e61d29999fe2b9c162
SHA51244502293ce18d321eb3f7b7db5f744957b5f5ccf8ede601abde3b0abf181d21906ec75e61ab725fb2e3ad0ea4cb771e8be0870e8b0d76e30c00ae9a18823635e
-
Filesize
930KB
MD5d66dd11b05c5b7841081e76e5ce5f740
SHA14b7a29381d069145ae110cb44f30fff64c93ea35
SHA256bd2ba0d8232eb823ee3c6fe6f4d6b82ca36d2c9b80e393e61d29999fe2b9c162
SHA51244502293ce18d321eb3f7b7db5f744957b5f5ccf8ede601abde3b0abf181d21906ec75e61ab725fb2e3ad0ea4cb771e8be0870e8b0d76e30c00ae9a18823635e
-
Filesize
548KB
MD55409d364b542618b7b5302144b2d8868
SHA1c6342e9487ba3ef7547d3ae83fc3f93610a9c59b
SHA256c03e36aba0bd70c59bbeba09c113584589fca6eb8c5ba7b6b1c6adcc74b4a53d
SHA51240db5589048ca8f5ae228c6da278633cec8950a87f7d9ce5e8a338bfbf28a29b975a9b1337e73d2dbaf53e455ade1ad6ddc6a24bc8f51df96725345b41fbe65b
-
Filesize
548KB
MD55409d364b542618b7b5302144b2d8868
SHA1c6342e9487ba3ef7547d3ae83fc3f93610a9c59b
SHA256c03e36aba0bd70c59bbeba09c113584589fca6eb8c5ba7b6b1c6adcc74b4a53d
SHA51240db5589048ca8f5ae228c6da278633cec8950a87f7d9ce5e8a338bfbf28a29b975a9b1337e73d2dbaf53e455ade1ad6ddc6a24bc8f51df96725345b41fbe65b
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.3MB
MD53f99439581b3499defd4a58c6f1cc2eb
SHA1236a6539ddddfe2ebfc79bfe9e4a71cafb04293f
SHA25651a0e3dff0e0eac66c47a02afab27de7e20b89e5d750843bb5739b9fe766c463
SHA512736482e9845db40f473b02d2c4a5246a80d78f7295ce11a65db2494b9450332ded22e728a7944ab259907509fbf76628a933d0251b7b5fad09fcd1f8e5d98d9f
-
Filesize
1.3MB
MD53f99439581b3499defd4a58c6f1cc2eb
SHA1236a6539ddddfe2ebfc79bfe9e4a71cafb04293f
SHA25651a0e3dff0e0eac66c47a02afab27de7e20b89e5d750843bb5739b9fe766c463
SHA512736482e9845db40f473b02d2c4a5246a80d78f7295ce11a65db2494b9450332ded22e728a7944ab259907509fbf76628a933d0251b7b5fad09fcd1f8e5d98d9f
-
Filesize
930KB
MD5d66dd11b05c5b7841081e76e5ce5f740
SHA14b7a29381d069145ae110cb44f30fff64c93ea35
SHA256bd2ba0d8232eb823ee3c6fe6f4d6b82ca36d2c9b80e393e61d29999fe2b9c162
SHA51244502293ce18d321eb3f7b7db5f744957b5f5ccf8ede601abde3b0abf181d21906ec75e61ab725fb2e3ad0ea4cb771e8be0870e8b0d76e30c00ae9a18823635e
-
Filesize
930KB
MD5d66dd11b05c5b7841081e76e5ce5f740
SHA14b7a29381d069145ae110cb44f30fff64c93ea35
SHA256bd2ba0d8232eb823ee3c6fe6f4d6b82ca36d2c9b80e393e61d29999fe2b9c162
SHA51244502293ce18d321eb3f7b7db5f744957b5f5ccf8ede601abde3b0abf181d21906ec75e61ab725fb2e3ad0ea4cb771e8be0870e8b0d76e30c00ae9a18823635e
-
Filesize
548KB
MD55409d364b542618b7b5302144b2d8868
SHA1c6342e9487ba3ef7547d3ae83fc3f93610a9c59b
SHA256c03e36aba0bd70c59bbeba09c113584589fca6eb8c5ba7b6b1c6adcc74b4a53d
SHA51240db5589048ca8f5ae228c6da278633cec8950a87f7d9ce5e8a338bfbf28a29b975a9b1337e73d2dbaf53e455ade1ad6ddc6a24bc8f51df96725345b41fbe65b
-
Filesize
548KB
MD55409d364b542618b7b5302144b2d8868
SHA1c6342e9487ba3ef7547d3ae83fc3f93610a9c59b
SHA256c03e36aba0bd70c59bbeba09c113584589fca6eb8c5ba7b6b1c6adcc74b4a53d
SHA51240db5589048ca8f5ae228c6da278633cec8950a87f7d9ce5e8a338bfbf28a29b975a9b1337e73d2dbaf53e455ade1ad6ddc6a24bc8f51df96725345b41fbe65b
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81